Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

provider: read private key from environment variable #472

Merged
merged 6 commits into from
Mar 1, 2021

Conversation

igungor
Copy link
Contributor

@igungor igungor commented Feb 23, 2021

If you keep your secrets in Vault (or similar secret manager), you need
to render a file for that secret, which complicates things on a
serverless platform. It'd be simpler to just export an environment
variable instead of managing files.

Fixes #471

If you keep your secrets in Vault (or similar secret manager), you need
to render a file for that secret, which complicates things on a
serverless platform. It'd be simpler to just export an environment
variable instead of managing files.

Fixes Snowflake-Labs#471
@igungor igungor requested a review from a team as a code owner February 23, 2021 15:21
@ryanking ryanking requested review from alldoami and removed request for ryanking February 23, 2021 18:00
pkg/provider/provider.go Show resolved Hide resolved
@ryanking
Copy link
Contributor

/ok-to-test sha=28109e3

@github-actions
Copy link

Integration tests success for 28109e3

@ryanking
Copy link
Contributor

ryanking commented Mar 1, 2021

/ok-to-test sha=b5f63f0

@czimergebot czimergebot merged commit ec5f2af into Snowflake-Labs:main Mar 1, 2021
@igungor igungor deleted the private-key-from-env branch March 1, 2021 17:45
@github-actions
Copy link

github-actions bot commented Mar 1, 2021

Integration tests success for b5f63f0

yohei1126 pushed a commit to singlife/terraform-provider-snowflake that referenced this pull request Mar 2, 2021
)

If you keep your secrets in Vault (or similar secret manager), you need
to render a file for that secret, which complicates things on a
serverless platform. It'd be simpler to just export an environment
variable instead of managing files.

Fixes Snowflake-Labs#471
@kevinstapleton
Copy link

@ryanking Thanks for getting this in! Is there an ETA on when this will be released to the TF provider registry?

anton-chekanov pushed a commit to anton-chekanov/terraform-provider-snowflake that referenced this pull request Jan 25, 2022
)

If you keep your secrets in Vault (or similar secret manager), you need
to render a file for that secret, which complicates things on a
serverless platform. It'd be simpler to just export an environment
variable instead of managing files.

Fixes Snowflake-Labs#471
daniepett pushed a commit to daniepett/terraform-provider-snowflake that referenced this pull request Feb 9, 2022
)

If you keep your secrets in Vault (or similar secret manager), you need
to render a file for that secret, which complicates things on a
serverless platform. It'd be simpler to just export an environment
variable instead of managing files.

Fixes Snowflake-Labs#471
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Read private key from environment variable
4 participants